首页 > 最新文献

JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY最新文献

英文 中文
IoT-based air pollution detection, monitoring and controlling system 基于物联网的空气污染检测、监测和控制系统
IF 1.4 Q1 Mathematics Pub Date : 2022-10-03 DOI: 10.1080/09720529.2022.2133254
Dipti Mitra, A. Saha
Abstract Air pollution is one of the most concerning and alarming problems in the modern world, and it is increasing day by day due to a large number of industries and urbanization. When pollutants are released into the air from several sources, such as the combustion of fossil fuels, industrial emissions, agricultural sources, and so on, it is referred to as air pollution. It is acknowledged as a significant risk factor for noncommunicable diseases (NCDs) that include lung cancer, stroke, heart disease, and acute and chronic respiratory illnesses including asthma. An estimated seven million individuals die globally every year due to air pollution as the world health organization reported on their website. In this paper, we have proposed an Internet of Things (IoT) based air pollution detection, monitoring, and controlling system. The system detects the various air pollutants by combining the different sensors, helps users to monitor the received pollutants levels over LCD, user’s mobile app, and cloud server, and controls the air quality up to a certain level when pollutants levels cross the threshold limits. NodeMCU plays an important role to exchange the data or information between the proposed system devices. We have designed a prototype for demonstrating the proposed system performance. The prototype testing and result show’s that the proposed system works significantly well in terms of detection, monitoring, and controlling air pollution, especially proposed controllers exhibit impressive performance for maintaining the air quality.
摘要空气污染是现代世界最令人担忧和担忧的问题之一,由于大量的工业和城市化,空气污染日益严重。当污染物从多种来源释放到空气中时,如化石燃料的燃烧、工业排放、农业来源等,称为空气污染。它被认为是非传染性疾病(NCDs)的重要风险因素,包括肺癌、中风、心脏病以及包括哮喘在内的急性和慢性呼吸道疾病。据世界卫生组织在其网站上报道,全球每年约有700万人死于空气污染。在本文中,我们提出了一种基于物联网的空气污染检测、监测和控制系统。该系统通过组合不同的传感器来检测各种空气污染物,帮助用户通过LCD、用户的移动应用程序和云服务器监测接收到的污染物水平,并在污染物水平超过阈值时将空气质量控制在一定水平。NodeMCU在所提出的系统设备之间交换数据或信息方面发挥着重要作用。我们已经设计了一个原型来演示所提出的系统性能。原型测试和结果表明,所提出的系统在检测、监测和控制空气污染方面运行良好,特别是所提出的控制器在保持空气质量方面表现出了令人印象深刻的性能。
{"title":"IoT-based air pollution detection, monitoring and controlling system","authors":"Dipti Mitra, A. Saha","doi":"10.1080/09720529.2022.2133254","DOIUrl":"https://doi.org/10.1080/09720529.2022.2133254","url":null,"abstract":"Abstract Air pollution is one of the most concerning and alarming problems in the modern world, and it is increasing day by day due to a large number of industries and urbanization. When pollutants are released into the air from several sources, such as the combustion of fossil fuels, industrial emissions, agricultural sources, and so on, it is referred to as air pollution. It is acknowledged as a significant risk factor for noncommunicable diseases (NCDs) that include lung cancer, stroke, heart disease, and acute and chronic respiratory illnesses including asthma. An estimated seven million individuals die globally every year due to air pollution as the world health organization reported on their website. In this paper, we have proposed an Internet of Things (IoT) based air pollution detection, monitoring, and controlling system. The system detects the various air pollutants by combining the different sensors, helps users to monitor the received pollutants levels over LCD, user’s mobile app, and cloud server, and controls the air quality up to a certain level when pollutants levels cross the threshold limits. NodeMCU plays an important role to exchange the data or information between the proposed system devices. We have designed a prototype for demonstrating the proposed system performance. The prototype testing and result show’s that the proposed system works significantly well in terms of detection, monitoring, and controlling air pollution, especially proposed controllers exhibit impressive performance for maintaining the air quality.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43328897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Graph signal processing and tunicate swarm optimization based image steganography using hybrid chaotic map based image scrambling 基于混合混沌映射置乱的图形信号处理和束状虫群优化图像隐写
IF 1.4 Q1 Mathematics Pub Date : 2022-10-03 DOI: 10.1080/09720529.2022.2139934
Shikha Chaudhary, Saroj Hiranwal, C. Gupta
Abstract This paper put forwards a secure image steganography technique for transmitting sensitive data using a Tunicate swarm optimization algorithm. A hybrid chaotic map-based image scrambling method is proposed with the combination of Tent and Tinkerbell chaotic maps. The scrambling of the secret image provides an added level of security in data hiding. The graph signal processing of cover image using the Meyer wavelet filter is performed to conceal the secret data within the transformed cover image using the alpha blending operation. To discover the optimal value of alpha for alpha blending, the tunicate swarm optimization algorithm is employed. To take the hidden information out at receiver end, the reverse approach is applied. The experimental results revealed that the embedding technique using the tunicate algorithm with a hybrid chaotic map provides better imperceptibility and robustness in comparison to the existing graph signal-based image steganography technique. The investigation is done on PSNR, MSE and SSIM performance parameters for evaluating the proposed technique.
摘要:提出了一种利用束状虫群优化算法实现敏感数据传输的安全图像隐写技术。提出了一种将Tent混沌映射与Tinkerbell混沌映射相结合的混合混沌映射图像置乱方法。对秘密图像的置乱为数据隐藏提供了额外的安全级别。利用Meyer小波滤波器对封面图像进行图形信号处理,利用alpha混合操作隐藏变换后的封面图像中的秘密数据。为了找到用于混合的最优alpha值,采用了束状虫群优化算法。为了在接收端取出隐藏信息,采用了相反的方法。实验结果表明,与现有的基于图信号的图像隐写技术相比,基于混合混沌映射的束状图算法嵌入技术具有更好的隐蔽性和鲁棒性。通过对PSNR、MSE和SSIM性能参数的研究,对该技术进行了评价。
{"title":"Graph signal processing and tunicate swarm optimization based image steganography using hybrid chaotic map based image scrambling","authors":"Shikha Chaudhary, Saroj Hiranwal, C. Gupta","doi":"10.1080/09720529.2022.2139934","DOIUrl":"https://doi.org/10.1080/09720529.2022.2139934","url":null,"abstract":"Abstract This paper put forwards a secure image steganography technique for transmitting sensitive data using a Tunicate swarm optimization algorithm. A hybrid chaotic map-based image scrambling method is proposed with the combination of Tent and Tinkerbell chaotic maps. The scrambling of the secret image provides an added level of security in data hiding. The graph signal processing of cover image using the Meyer wavelet filter is performed to conceal the secret data within the transformed cover image using the alpha blending operation. To discover the optimal value of alpha for alpha blending, the tunicate swarm optimization algorithm is employed. To take the hidden information out at receiver end, the reverse approach is applied. The experimental results revealed that the embedding technique using the tunicate algorithm with a hybrid chaotic map provides better imperceptibility and robustness in comparison to the existing graph signal-based image steganography technique. The investigation is done on PSNR, MSE and SSIM performance parameters for evaluating the proposed technique.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44456963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A hybrid convolutional long short-term memory (CNN-LSTM) based natural language processing (NLP) model for sentiment analysis of customer product reviews in Bangla 基于混合卷积长短期记忆(CNN-LSTM)的自然语言处理(NLP)模型用于孟加拉语客户产品评论的情感分析
IF 1.4 Q1 Mathematics Pub Date : 2022-10-03 DOI: 10.1080/09720529.2022.2133250
Mahbuba Rahman Purba, Moniya Akter, Rubayea Ferdows, Fuad Ahmed
Abstract Sentiment Analysis (SA) examines how people feel about products, services, people, organizations, events etc. Most of the Natural language processing on SA research has focused on English. In the case of Bangla, it lacks sufficient study as well as a proper dataset. All previous analyses employed KNN, NB, and other methods. We develop a natural language processing (NLP) model for separating opinion and sentiment from Bangla customer surveys. This technology isolates extreme client opinions to help with business and marketing decisions. Bangladesh is embracing e-commerce and f-commerce. Client comments and evaluations are becoming more significant in judging product or service quality, and this industry is evolving toward internet distribution. Organizations utilize client audits to check product quality. Our objective is to systematically collect client feedback and understand their product reaction. We used a hybrid CNN-LSTM based NLP model to classify Bangla texts in 3 viewpoint categories (positive, negative and neutral). We tested our model using a Bangla dataset that we generated. For our dataset, we collected polls and comments from websites and social media. Finally, among the three evaluation matrices, the f-1 score is providing the highest average, and the three-opinion technique is 87.22 percent accurate in determining the performance of our task.
摘要情感分析(SA)考察了人们对产品、服务、人、组织、事件等的感受。SA研究中的大多数自然语言处理都集中在英语上。就孟加拉语而言,它缺乏足够的研究和适当的数据集。所有先前的分析均采用KNN、NB和其他方法。我们开发了一个自然语言处理(NLP)模型,用于从孟加拉客户调查中分离意见和情绪。这项技术隔离了极端客户的意见,以帮助做出商业和营销决策。孟加拉国正在拥抱电子商务和电子商务。客户的评论和评价在判断产品或服务质量方面变得越来越重要,这个行业正在向互联网分销发展。组织利用客户审计来检查产品质量。我们的目标是系统地收集客户反馈并了解他们的产品反应。我们使用基于CNN-LSTM的混合NLP模型将孟加拉语文本分为3个观点类别(积极、消极和中性)。我们使用我们生成的Bangla数据集测试了我们的模型。对于我们的数据集,我们收集了来自网站和社交媒体的民意调查和评论。最后,在三个评估矩阵中,f-1得分提供了最高的平均值,三意见技术在确定我们的任务表现方面的准确率为87.22%。
{"title":"A hybrid convolutional long short-term memory (CNN-LSTM) based natural language processing (NLP) model for sentiment analysis of customer product reviews in Bangla","authors":"Mahbuba Rahman Purba, Moniya Akter, Rubayea Ferdows, Fuad Ahmed","doi":"10.1080/09720529.2022.2133250","DOIUrl":"https://doi.org/10.1080/09720529.2022.2133250","url":null,"abstract":"Abstract Sentiment Analysis (SA) examines how people feel about products, services, people, organizations, events etc. Most of the Natural language processing on SA research has focused on English. In the case of Bangla, it lacks sufficient study as well as a proper dataset. All previous analyses employed KNN, NB, and other methods. We develop a natural language processing (NLP) model for separating opinion and sentiment from Bangla customer surveys. This technology isolates extreme client opinions to help with business and marketing decisions. Bangladesh is embracing e-commerce and f-commerce. Client comments and evaluations are becoming more significant in judging product or service quality, and this industry is evolving toward internet distribution. Organizations utilize client audits to check product quality. Our objective is to systematically collect client feedback and understand their product reaction. We used a hybrid CNN-LSTM based NLP model to classify Bangla texts in 3 viewpoint categories (positive, negative and neutral). We tested our model using a Bangla dataset that we generated. For our dataset, we collected polls and comments from websites and social media. Finally, among the three evaluation matrices, the f-1 score is providing the highest average, and the three-opinion technique is 87.22 percent accurate in determining the performance of our task.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47018130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A novel approach for user authentication using keystroke dynamics 一种使用击键动力学进行用户身份验证的新方法
IF 1.4 Q1 Mathematics Pub Date : 2022-10-03 DOI: 10.1080/09720529.2022.2133241
Kirty Shekhawat, Devershi Pallavi Bhatt
Abstract One Time Password (OTP) and Text Password are becoming less important in the current age of cybercrime because of the rapid development of new security systems. A user authentication system that is easy, robust, scalable, and cost-effective is a must. For both security and surveillance purposes, keystroke biometrics is a viable option. Behavior biometrics, of which keystroke biometrics is a subset, is used to identify individuals based on the way they type. Typing habits are not set in stone and are subject to change depending on the scenario, the device being used, and the user’s emotional state. As a result, the performance of a keystroke biometrics-based user authentication system is influenced by how well the retrieved information from typing and classification algorithms is processed. Using a keyboard with an array of pressure sensors, this research presents a unique way to keystroke dynamics-based authentication. The goal of this study is to develop user profiles that are unique and different in order to improve the suggested system’s efficiency. A real-world dataset is used to test the suggested method. The outcome is achieved with a 97% success rate in experiments.
摘要在当前网络犯罪时代,由于新的安全系统的快速发展,一次性密码和文本密码变得越来越不重要。一个简单、健壮、可扩展且具有成本效益的用户身份验证系统是必不可少的。出于安全和监视的目的,按键生物识别是一个可行的选择。行为生物识别技术是其中的一个子集,用于根据个人的打字方式识别他们。打字习惯不是一成不变的,可能会根据场景、使用的设备和用户的情绪状态而改变。因此,基于击键生物特征的用户认证系统的性能受到从打字和分类算法检索到的信息的处理程度的影响。使用一个带有压力传感器阵列的键盘,这项研究提供了一种独特的基于击键动力学的身份验证方法。本研究的目标是开发独特和不同的用户档案,以提高建议系统的效率。使用真实世界的数据集来测试所建议的方法。实验成功率达97%。
{"title":"A novel approach for user authentication using keystroke dynamics","authors":"Kirty Shekhawat, Devershi Pallavi Bhatt","doi":"10.1080/09720529.2022.2133241","DOIUrl":"https://doi.org/10.1080/09720529.2022.2133241","url":null,"abstract":"Abstract One Time Password (OTP) and Text Password are becoming less important in the current age of cybercrime because of the rapid development of new security systems. A user authentication system that is easy, robust, scalable, and cost-effective is a must. For both security and surveillance purposes, keystroke biometrics is a viable option. Behavior biometrics, of which keystroke biometrics is a subset, is used to identify individuals based on the way they type. Typing habits are not set in stone and are subject to change depending on the scenario, the device being used, and the user’s emotional state. As a result, the performance of a keystroke biometrics-based user authentication system is influenced by how well the retrieved information from typing and classification algorithms is processed. Using a keyboard with an array of pressure sensors, this research presents a unique way to keystroke dynamics-based authentication. The goal of this study is to develop user profiles that are unique and different in order to improve the suggested system’s efficiency. A real-world dataset is used to test the suggested method. The outcome is achieved with a 97% success rate in experiments.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46676202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Using clustering scheme: Prevent reply attack in vehicular ad-hoc networks (VANET) 使用集群方案:防止车载自组织网络(VANET)中的回复攻击
IF 1.4 Q1 Mathematics Pub Date : 2022-10-03 DOI: 10.1080/09720529.2022.2133240
Mousumi Ahmed Mimi
Abstract Many researchers work on VANET which is a hot topic for today’s research work. VANET transfers data, messages sent and makes life safe but lots of consequences also occur. Among them, there are lots of attacks that can happen in VANET. Replay attacks, DoS attacks, and DDoS attacks are among them. Many researchers work to detect replay and DDoS attacks but they do not provide any solution for preventing the attacks. Some researchers provide some researches with algorithms to prevent replay attacks. All of them apply V2I communication without clustering to prevent replay attacks but they cannot prevent it with 100% accuracy. They do not apply any clustering formula to prevent replay attacks. To prevent replay attacks I will apply V2V communication with clustering formula. By using SUMO, NS3 I will prove that applying the clustering formula prevents attacks more than without applying it to the cluster.
摘要许多研究者都在研究VANET,这是当今研究工作的热点。VANET传输数据、发送信息,确保生命安全,但也会产生许多后果。其中,VANET中可能发生许多攻击。重播攻击、DoS攻击和DDoS攻击都在其中。许多研究人员致力于检测重播和DDoS攻击,但他们没有提供任何预防攻击的解决方案。一些研究人员为一些研究提供了防止重放攻击的算法。它们都在没有集群的情况下应用V2I通信来防止重放攻击,但它们无法100%准确地防止重放攻击。它们不应用任何集群公式来防止重放攻击。为了防止重放攻击,我将应用V2V通信和集群公式。通过使用SUMO,NS3I将证明应用集群公式比不将其应用于集群更能防止攻击。
{"title":"Using clustering scheme: Prevent reply attack in vehicular ad-hoc networks (VANET)","authors":"Mousumi Ahmed Mimi","doi":"10.1080/09720529.2022.2133240","DOIUrl":"https://doi.org/10.1080/09720529.2022.2133240","url":null,"abstract":"Abstract Many researchers work on VANET which is a hot topic for today’s research work. VANET transfers data, messages sent and makes life safe but lots of consequences also occur. Among them, there are lots of attacks that can happen in VANET. Replay attacks, DoS attacks, and DDoS attacks are among them. Many researchers work to detect replay and DDoS attacks but they do not provide any solution for preventing the attacks. Some researchers provide some researches with algorithms to prevent replay attacks. All of them apply V2I communication without clustering to prevent replay attacks but they cannot prevent it with 100% accuracy. They do not apply any clustering formula to prevent replay attacks. To prevent replay attacks I will apply V2V communication with clustering formula. By using SUMO, NS3 I will prove that applying the clustering formula prevents attacks more than without applying it to the cluster.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44429499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Guest Editors 特邀编辑
IF 1.4 Q1 Mathematics Pub Date : 2022-10-03 DOI: 10.1080/09720529.2022.2156438
R. C. Poonia, Kashinath Chatterjee, Linesh Raja, Md. Ashraful Babu, Pranav Dass
{"title":"Guest Editors","authors":"R. C. Poonia, Kashinath Chatterjee, Linesh Raja, Md. Ashraful Babu, Pranav Dass","doi":"10.1080/09720529.2022.2156438","DOIUrl":"https://doi.org/10.1080/09720529.2022.2156438","url":null,"abstract":"","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49012537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Foreword 前言
IF 1.4 Q1 Mathematics Pub Date : 2022-10-03 DOI: 10.1080/09720510.2022.2145706
R. C. Poonia, K. Chatterjee, Linesh Raja, Md. Ashraful Babu, Pranav Dass
{"title":"Foreword","authors":"R. C. Poonia, K. Chatterjee, Linesh Raja, Md. Ashraful Babu, Pranav Dass","doi":"10.1080/09720510.2022.2145706","DOIUrl":"https://doi.org/10.1080/09720510.2022.2145706","url":null,"abstract":"","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41585717","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cryptographic key distribution using artificial intelligence for data security and location privacy in VANET VANET中使用人工智能实现数据安全和位置隐私的密钥分发
IF 1.4 Q1 Mathematics Pub Date : 2022-10-03 DOI: 10.1080/09720529.2022.2133256
Shivkant Kaushik, R. C. Poonia, S. Khatri
Abstract Location privacy & data security in VANET are now becoming most important in today’s paradigm of information age. Unauthorized access to location information of vehicles may pose a significant security threat, thus it is necessary to secure this information from intruders. In proposed work, Artificial intelligence based RF range approximation is used with multi key controlled cryptography for enhancement of location privacy and data security in service location protocol of VANET’S.
在当今信息时代的范式中,VANET中的位置隐私和数据安全现在变得最重要。未经授权访问车辆的位置信息可能会对安全构成重大威胁,因此有必要保护这些信息免受入侵者的侵害。本文将基于人工智能的射频距离逼近与多密钥控制密码技术相结合,增强了VANET服务定位协议的位置隐私性和数据安全性。
{"title":"Cryptographic key distribution using artificial intelligence for data security and location privacy in VANET","authors":"Shivkant Kaushik, R. C. Poonia, S. Khatri","doi":"10.1080/09720529.2022.2133256","DOIUrl":"https://doi.org/10.1080/09720529.2022.2133256","url":null,"abstract":"Abstract Location privacy & data security in VANET are now becoming most important in today’s paradigm of information age. Unauthorized access to location information of vehicles may pose a significant security threat, thus it is necessary to secure this information from intruders. In proposed work, Artificial intelligence based RF range approximation is used with multi key controlled cryptography for enhancement of location privacy and data security in service location protocol of VANET’S.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46929173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A type of public cryptosystem using polynomials and pell sequences 一种使用多项式和pell序列的公共密码系统
IF 1.4 Q1 Mathematics Pub Date : 2022-10-03 DOI: 10.1080/09720529.2022.2133237
Gudela Ashok, S. Ashok Kumar, D. Chaya Kumari, Mathe Ramakrishna
Abstract In this paper, a kind of Public key Cryptosystem is established using Polynomials and Pell sequences by exploiting the properties of both Polynomials and Pell sequences by converting Polynomial into Octal and Binary system. Securing the digital data and modifying it by using modern Cryptographic methods that plays a vital role in Network Security.
摘要本文利用多项式和Pell序列的性质,将多项式转换为八进制和二进制,利用多项式和佩尔序列建立了一种公钥密码系统。通过使用现代密码学方法来保护数字数据并对其进行修改,这在网络安全中起着至关重要的作用。
{"title":"A type of public cryptosystem using polynomials and pell sequences","authors":"Gudela Ashok, S. Ashok Kumar, D. Chaya Kumari, Mathe Ramakrishna","doi":"10.1080/09720529.2022.2133237","DOIUrl":"https://doi.org/10.1080/09720529.2022.2133237","url":null,"abstract":"Abstract In this paper, a kind of Public key Cryptosystem is established using Polynomials and Pell sequences by exploiting the properties of both Polynomials and Pell sequences by converting Polynomial into Octal and Binary system. Securing the digital data and modifying it by using modern Cryptographic methods that plays a vital role in Network Security.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41567416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Designing and developing IoT based security system for smart home 设计和开发基于物联网的智能家居安防系统
IF 1.4 Q1 Mathematics Pub Date : 2022-10-03 DOI: 10.1080/09720529.2022.2133244
Md. Sharifuzzaman, Jahidul Islam, Suman Chowdhury
Abstract This paper represents Internet of Things (IoT) based security system for smart home. As technology has progressed and the use of IoT has grown, digital door locks have become increasingly common. Door Security System application uses ESP8266 and IoT technology to monitor the status of the door. Blynk is a communication protocol that allows a smartphone to communicate with a door lock system. The Door Security System is available on Android and iOS. With this automation system, users may utilize an IR (Infrared remote) remote to manage their home security system from afar. We attempted to connect door security system in our home. Obviously, we will be able to solve that problem in the future. WiFi modules connect to our home internet router and link to our IoT server. Our Android and Web applications communicate with the server as well. This program allows users to check the current state of their home appliances and control them from anywhere. Also MQ3 indicates higher overall performance than the MQ2 in phrases of distance and reaction time.
本文介绍了基于物联网(IoT)的智能家居安防系统。随着技术的进步和物联网的使用越来越多,数字门锁变得越来越普遍。门安防系统应用采用ESP8266和物联网技术来监控门的状态。Blynk是一种通信协议,允许智能手机与门锁系统通信。门安全系统支持安卓和iOS两种操作系统。有了这个自动化系统,用户可以利用红外遥控器远程管理他们的家庭安全系统。我们试图连接我们家的门安全系统。显然,我们将来能够解决这个问题。WiFi模块连接到我们的家庭互联网路由器,并连接到我们的物联网服务器。我们的Android和Web应用程序也与服务器通信。这个程序允许用户检查他们的家用电器的当前状态,并从任何地方控制他们。此外,MQ3在距离和反应时间方面也比MQ2表现出更高的总体性能。
{"title":"Designing and developing IoT based security system for smart home","authors":"Md. Sharifuzzaman, Jahidul Islam, Suman Chowdhury","doi":"10.1080/09720529.2022.2133244","DOIUrl":"https://doi.org/10.1080/09720529.2022.2133244","url":null,"abstract":"Abstract This paper represents Internet of Things (IoT) based security system for smart home. As technology has progressed and the use of IoT has grown, digital door locks have become increasingly common. Door Security System application uses ESP8266 and IoT technology to monitor the status of the door. Blynk is a communication protocol that allows a smartphone to communicate with a door lock system. The Door Security System is available on Android and iOS. With this automation system, users may utilize an IR (Infrared remote) remote to manage their home security system from afar. We attempted to connect door security system in our home. Obviously, we will be able to solve that problem in the future. WiFi modules connect to our home internet router and link to our IoT server. Our Android and Web applications communicate with the server as well. This program allows users to check the current state of their home appliances and control them from anywhere. Also MQ3 indicates higher overall performance than the MQ2 in phrases of distance and reaction time.","PeriodicalId":46563,"journal":{"name":"JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY","volume":null,"pages":null},"PeriodicalIF":1.4,"publicationDate":"2022-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43128221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1